메뉴 건너뛰기




Volumn 22, Issue 1, 2012, Pages 77-94

Information security policies in the UK healthcare sector: A critical evaluation

Author keywords

Critical research; Habermas; Health care; Hegemony; Ideology; Information security

Indexed keywords

CRITICAL DISCOURSE ANALYSIS; CRITICAL EVALUATION; EXISTING PROBLEMS; HABERMAS; HEALTHCARE SECTORS; HEGEMONY; IDEOLOGY; INFORMATION ACCURACY; INFORMATION RESOURCE; INFORMATION SECURITY POLICIES; NATIONAL HEALTH SERVICES; PATIENT CONFIDENTIALITY;

EID: 84855226627     PISSN: 13501917     EISSN: 13652575     Source Type: Journal    
DOI: 10.1111/j.1365-2575.2011.00378.x     Document Type: Article
Times cited : (85)

References (57)
  • 1
    • 44249114234 scopus 로고    scopus 로고
    • Privacy and security of personal information: economic incentives and technological solutions
    • Camp, L.J. & Lewis, S. (eds) - Kluwer, Dordrecht, The Netherlands.
    • Acquisti, A. (2004) Privacy and security of personal information: economic incentives and technological solutions. In: Economics of Information Security, Camp, L.J. & Lewis, S. (eds), pp. 179-186. Kluwer, Dordrecht, The Netherlands.
    • (2004) Economics of Information Security , pp. 179-186
    • Acquisti, A.1
  • 2
    • 84986120029 scopus 로고    scopus 로고
    • 'It was a great system'- face-work and the discursive construction of technology during information systems development
    • Alvarez, R. (2001) 'It was a great system'- face-work and the discursive construction of technology during information systems development. Information Technology & People, 14, 385-405.
    • (2001) Information Technology & People , vol.14 , pp. 385-405
    • Alvarez, R.1
  • 3
    • 40249115077 scopus 로고    scopus 로고
    • Examining technology, structure and identity during an enterprise systems implementation
    • Alvarez, R. (2008) Examining technology, structure and identity during an enterprise systems implementation. Information Systems Journal, 18, 203-224.
    • (2008) Information Systems Journal , vol.18 , pp. 203-224
    • Alvarez, R.1
  • 4
    • 84951278888 scopus 로고    scopus 로고
    • Alvesson, M. & Willmott, H. (eds) Sage, London, UK.
    • Alvesson, M. & Willmott, H. (eds) (2003) Studying Management Critically. Sage, London, UK.
    • (2003) Studying Management Critically
  • 5
    • 16244420769 scopus 로고    scopus 로고
    • Doing critical research in information systems: some further thoughts
    • Avgerou, C (2005) Doing critical research in information systems: some further thoughts. Information Systems Journal, 15, 103-109.
    • (2005) Information Systems Journal , vol.15 , pp. 103-109
    • Avgerou, C.1
  • 6
    • 33846027847 scopus 로고    scopus 로고
    • Circuits of power in creating de jure standards: shaping an international information systems security standard
    • special issue on standard making
    • Backhouse, J., Hsu, C.W. & Silva, L. (2006) Circuits of power in creating de jure standards: shaping an international information systems security standard. MIS Quarterly, 30, special issue on standard making, 413-438.
    • (2006) MIS Quarterly , vol.30 , pp. 413-438
    • Backhouse, J.1    Hsu, C.W.2    Silva, L.3
  • 7
    • 85025229028 scopus 로고
    • Information technology, control and power: the centralization and decentralization debate revisited
    • Bloomfield, B. (1992) Information technology, control and power: the centralization and decentralization debate revisited. Journal of Management Studies, 29, 459-484.
    • (1992) Journal of Management Studies , vol.29 , pp. 459-484
    • Bloomfield, B.1
  • 8
    • 40249106176 scopus 로고    scopus 로고
    • Exploring the critical agenda in information systems research
    • doi:10.1111/j.1365-2575.2008.00295.x
    • Cecez-Kecmanovic, D., Klein, H.K. & Brooke, C. (2008) Exploring the critical agenda in information systems research. Information Systems Journal, 18, 123-135. doi:10.1111/j.1365-2575.2008.00295.x
    • (2008) Information Systems Journal , vol.18 , pp. 123-135
    • Cecez-Kecmanovic, D.1    Klein, H.K.2    Brooke, C.3
  • 10
    • 74549207774 scopus 로고    scopus 로고
    • Applying Habermas' validity claims as a standard for critical discourse analysis
    • Kaplan, B., Truex, D., Wood-Harper, T & DeGross, J. (eds) - Kluwer Academic Publishers, Dordrecht, The Netherlands.
    • Cukier, W., Bauer, R. & Middleton, C. (2004) Applying Habermas' validity claims as a standard for critical discourse analysis. In: Information Systems Research - Relevant Theory and Informed Practice, Kaplan, B., Truex, D., Wood-Harper, T & DeGross, J. (eds), pp. 233-258. Kluwer Academic Publishers, Dordrecht, The Netherlands.
    • (2004) Information Systems Research - Relevant Theory and Informed Practice , pp. 233-258
    • Cukier, W.1    Bauer, R.2    Middleton, C.3
  • 11
    • 0002667164 scopus 로고
    • Disciplinary power in the modern corporation
    • Alvesson, M. & Willmott, H. (eds) - Sage, London, UK.
    • Deetz, S. (1992) Disciplinary power in the modern corporation. In: Critical Management Studies, Alvesson, M. & Willmott, H. (eds), pp. 21-45. Sage, London, UK.
    • (1992) Critical Management Studies , pp. 21-45
    • Deetz, S.1
  • 12
    • 70449576952 scopus 로고    scopus 로고
    • Realizing benefits of an information security program
    • Dhillon, G (2004) Realizing benefits of an information security program. Business Process Management Journal, 10, 21-22.
    • (2004) Business Process Management Journal , vol.10 , pp. 21-22
    • Dhillon, G.1
  • 13
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon, G. & Torkzadeh, G. (2006) Value-focused assessment of information system security in organizations. Information Systems Journal, 16, 293-314.
    • (2006) Information Systems Journal , vol.16 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 15
    • 25144436981 scopus 로고    scopus 로고
    • Do information security policies reduce the incidence of security breaches: an exploratory analysis
    • Doherty, N.F. & Fulford, H. (2005) Do information security policies reduce the incidence of security breaches: an exploratory analysis. Information Resources Management Journal, 18, 20-38.
    • (2005) Information Resources Management Journal , vol.18 , pp. 20-38
    • Doherty, N.F.1    Fulford, H.2
  • 16
    • 32444443168 scopus 로고    scopus 로고
    • Aligning the information security policy with the strategic information systems plan
    • Doherty, N.F. & Fulford, H. (2006) Aligning the information security policy with the strategic information systems plan. Computers & Security, 23, 55-63.
    • (2006) Computers & Security , vol.23 , pp. 55-63
    • Doherty, N.F.1    Fulford, H.2
  • 17
    • 70449596008 scopus 로고    scopus 로고
    • The information security policy unpacked: a critical study of the content of university policies
    • Doherty, N.F., Anastasakis, L. & Fulford, H. (2009) The information security policy unpacked: a critical study of the content of university policies. International Journal of Information Management, 29, 449-457.
    • (2009) International Journal of Information Management , vol.29 , pp. 449-457
    • Doherty, N.F.1    Anastasakis, L.2    Fulford, H.3
  • 19
    • 0142058507 scopus 로고    scopus 로고
    • Sociotechnical networks and information management in health care
    • Doolin, B. (1999) Sociotechnical networks and information management in health care. Accounting, Management & Information Technology, 9, 95-114.
    • (1999) Accounting, Management & Information Technology , vol.9 , pp. 95-114
    • Doolin, B.1
  • 20
    • 0001474322 scopus 로고
    • Critical Discourse Analysis and the Marketization of Public Discourse: The Universities
    • Fairclough, N. (1993) Critical Discourse Analysis and the Marketization of Public Discourse: The Universities, Discourse & Society, 4, 133-168.
    • (1993) Discourse & Society , vol.4 , pp. 133-168
    • Fairclough, N.1
  • 28
    • 33846126313 scopus 로고    scopus 로고
    • 2nd edn. Routledge, London, UK.
    • Hawkes, D. (2003) Ideology, 2nd edn. Routledge, London, UK.
    • (2003) Ideology
    • Hawkes, D.1
  • 29
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: a framework for security policy compliance in organisations
    • Herath, T. & Rao, H.R. (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 30
    • 0039292695 scopus 로고
    • Nachtrag zu 'Traditionelle und kritische Theorie'
    • Horkheimer, M, 1992, Suhrkamp, Frankfurt, Germany.
    • Horkheimer, M. (1937) Nachtrag zu 'Traditionelle und kritische Theorie'. In: Traditionelle und kritische Theorie, Horkheimer, M (ed.), 1992 pp. 261-269. Suhrkamp, Frankfurt, Germany.
    • (1937) Traditionelle und kritische Theorie , pp. 261-269
    • Horkheimer, M.1
  • 31
    • 33645861578 scopus 로고    scopus 로고
    • Palgrave McMillan, New York, USA.
    • How, A. (2003) Critical Theory. Palgrave McMillan, New York, USA.
    • (2003) Critical Theory
    • How, A.1
  • 33
    • 33644972807 scopus 로고    scopus 로고
    • Rethinking critical theory and qualitative research
    • 3rd edn, Denzin, N.K. & Lincoln, Y.S. (eds) - Sage, Thousand Oaks, CA, USA.
    • Kincheloe, JL & McLaren, P (2005) Rethinking critical theory and qualitative research. In: SAGE Handbook of Qualitative Research, 3rd edn, Denzin, N.K. & Lincoln, Y.S. (eds), pp. 305-342. Sage, Thousand Oaks, CA, USA.
    • (2005) SAGE Handbook of Qualitative Research , pp. 305-342
    • Kincheloe, J.L.1    McLaren, P.2
  • 34
    • 2442435192 scopus 로고    scopus 로고
    • The critical social theory of Jürgen Habermas and its implications for IS research
    • Mingers, J. & Willcocks, L. (eds) - Wiley, Chichester, UK.
    • Klein, H.K. & Huynh, M.Q. (2004) The critical social theory of Jürgen Habermas and its implications for IS research. In: Social Theory and Philosophy for Information Systems, Mingers, J. & Willcocks, L. (eds), pp. 157-237. Wiley, Chichester, UK.
    • (2004) Social Theory and Philosophy for Information Systems , pp. 157-237
    • Klein, H.K.1    Huynh, M.Q.2
  • 36
    • 9744229973 scopus 로고    scopus 로고
    • Informating the clan: controlling physicians' costs and outcomes
    • Kohli, R. & Kettinger, W.J. (2004) Informating the clan: controlling physicians' costs and outcomes. MIS Quarterly, 28, 363-394.
    • (2004) MIS Quarterly , vol.28 , pp. 363-394
    • Kohli, R.1    Kettinger, W.J.2
  • 37
    • 84855234180 scopus 로고    scopus 로고
    • A security model for military message systems: retrospective. [WWW document]. URL (accessed 4 January 2006).
    • Landwehr, C.E., Heitmeyer, C.L. & McLean, J.D. (2001) A security model for military message systems: retrospective. [WWW document]. URL (accessed 4 January 2006).
    • (2001)
    • Landwehr, C.E.1    Heitmeyer, C.L.2    McLean, J.D.3
  • 38
    • 0002994697 scopus 로고
    • Information Systems and Critical Theory
    • M. Alvesson and H. Willmott (eds) - Sage Publications, London, UK.
    • Lyytinen, K. (1992) Information Systems and Critical Theory. In: Critical Management Studies, M. Alvesson and H. Willmott (eds), pp. 159-180. Sage Publications, London, UK.
    • (1992) Critical Management Studies , pp. 159-180
    • Lyytinen, K.1
  • 39
    • 16244406605 scopus 로고    scopus 로고
    • Doing critical research in information systems: a case of theory and practice not informing each other
    • McGrath, K. (2005) Doing critical research in information systems: a case of theory and practice not informing each other. Information Systems Journal, 15, 85-101.
    • (2005) Information Systems Journal , vol.15 , pp. 85-101
    • McGrath, K.1
  • 40
    • 79959546460 scopus 로고    scopus 로고
    • A set of principles for conducting critical research in information systems
    • Myers, M.D. & Klein, H.K. (2011) A set of principles for conducting critical research in information systems. MIS Quarterly, 35, 17-36.
    • (2011) MIS Quarterly , vol.35 , pp. 17-36
    • Myers, M.D.1    Klein, H.K.2
  • 41
    • 0000395003 scopus 로고    scopus 로고
    • Communication richness in electronic mail: critical social theory and the contextuality of meaning
    • Ngwenyama, O.K. & Lee, A.S. (1997) Communication richness in electronic mail: critical social theory and the contextuality of meaning. MIS Quarterly, 21, 145-167.
    • (1997) MIS Quarterly , vol.21 , pp. 145-167
    • Ngwenyama, O.K.1    Lee, A.S.2
  • 42
    • 84855234181 scopus 로고    scopus 로고
    • Users and trust in cyberspace. Cambridge Security Protocoll Workshop, 3-5 July, 2000 Cambridge, England.
    • Nikander, P. & Karvonen, K. (2000) Users and trust in cyberspace. Cambridge Security Protocoll Workshop, 3-5 July, 2000 Cambridge, England.
    • (2000)
    • Nikander, P.1    Karvonen, K.2
  • 43
    • 31144461818 scopus 로고    scopus 로고
    • Where computer security meets national security
    • Nissenbaum, H. (2005) Where computer security meets national security. Ethics and Information Technology, 7, 61-73.
    • (2005) Ethics and Information Technology , vol.7 , pp. 61-73
    • Nissenbaum, H.1
  • 45
    • 0001586794 scopus 로고
    • Critical theory and accounting
    • Alvesson, M. & Willmott, H. (eds) - Sage, London, UK.
    • Power, M. & Laughlin, R. (1992) Critical theory and accounting. In: Critical Management Studies, Alvesson, M. & Willmott, H. (eds), pp. 113-135. Sage, London, UK.
    • (1992) Critical Management Studies , pp. 113-135
    • Power, M.1    Laughlin, R.2
  • 48
    • 34249995956 scopus 로고    scopus 로고
    • The mysterious case of the missing paradigm: a review of critical information systems research 1991-2001
    • Richardson, H. & Robinson, B. (2007) The mysterious case of the missing paradigm: a review of critical information systems research 1991-2001. Information Systems Journal, 17, 251-270.
    • (2007) Information Systems Journal , vol.17 , pp. 251-270
    • Richardson, H.1    Robinson, B.2
  • 49
    • 0013064970 scopus 로고    scopus 로고
    • Studying knowledge management in information systems research: discourses and theoretical assumptions
    • Schultze, U. & Leidner, D. (2002) Studying knowledge management in information systems research: discourses and theoretical assumptions. MIS Quarterly, 26, 213-242.
    • (2002) MIS Quarterly , vol.26 , pp. 213-242
    • Schultze, U.1    Leidner, D.2
  • 50
    • 84870957440 scopus 로고    scopus 로고
    • Power and practice in information systems security research. In: Proceedings of the Twenty Ninth International Conference on Information Systems. Paris.
    • Siponen, M., Willison, R. & Baskerville, R. (2008) Power and practice in information systems security research. In: Proceedings of the Twenty Ninth International Conference on Information Systems. Paris.
    • (2008)
    • Siponen, M.1    Willison, R.2    Baskerville, R.3
  • 51
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern is security development approaches: towards the next generation of social and adaptable ISS methods
    • Siponen, M.T. (2005) Analysis of modern is security development approaches: towards the next generation of social and adaptable ISS methods. Information and Organization, 15, 339-375.
    • (2005) Information and Organization , vol.15 , pp. 339-375
    • Siponen, M.T.1
  • 53
    • 2642578963 scopus 로고    scopus 로고
    • Responsibility for information assurance and privacy: a problem of individual ethics?
    • Stahl, B.C. (2004) Responsibility for information assurance and privacy: a problem of individual ethics? Journal of Organizational and End User Computing, 16, 59-77.
    • (2004) Journal of Organizational and End User Computing , vol.16 , pp. 59-77
    • Stahl, B.C.1
  • 54
    • 15844380346 scopus 로고    scopus 로고
    • Learning about being critical
    • Walsham, G. (2005) Learning about being critical. Information Systems Journal, 15, 111-117.
    • (2005) Information Systems Journal , vol.15 , pp. 111-117
    • Walsham, G.1
  • 55
    • 84902506288 scopus 로고    scopus 로고
    • From critical theory into information systems practice: a case study of a payroll-personnel system
    • In, IFIP 8.2 Proceedings), Kaplan, B., Truex, D.P., Wastell, D., Wood-Harper, A.T. & DeGross, J. (eds) - Kluwer, Dordrecht, The Netherlands.
    • Waring, T. (2004) From critical theory into information systems practice: a case study of a payroll-personnel system. In: Information Systems Research: Relevant Theory and Informed Practice, (IFIP 8.2 Proceedings), Kaplan, B., Truex, D.P., Wastell, D., Wood-Harper, A.T. & DeGross, J. (eds), pp. 556-575. Kluwer, Dordrecht, The Netherlands.
    • (2004) Information Systems Research: Relevant Theory and Informed Practice , pp. 556-575
    • Waring, T.1
  • 57
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: a threat control model and empirical test
    • Workman, M., Bommer, W.H. & Straub, D. (2008) Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in Human Behavior, 24, 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.